:: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
 Categories >> Software >> ERP CRM >> SAP >> SAP Security       
Suggest New Category 


View Page with Answers
  Question  Asked @ Answers Views     select
What is difference between BW and BI Security? Accenture  2  1109
How to create user in SAP without giving LASTNAME and INITIAL PASSWORD ? Accenture  1  1591
What is the difference between User group in LOGON DATA tab and user group in GROUPS tab in SU01 t code? Deloitte  6  1701
in which table we can find all authorization groups Cognizent  4  1331
Difference between 4.7c and ECC 6.0 in security aspect? I tried in many website but still not able to find the correct one. cts  2  784
How to identify which Authorization Objects contains which fields \ activities? IBM  6  1316
I want to give access to sec admin for assigning roles to users, but self assignment should not be possible . how it is?  1  828
in how many roles a T-code exists? Find it without se16 or suim IBM   7  1850
How to access sap security throw internet?  1  507
how to delete a single role,the single role is existing with 10 users  3  1393
how to lock the client? IBM  2  1533
How can you find all t-codes which are locked in the system ? Wipro   4  1980
What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ? Wipro  13  1942
Whay can't you assign a composite role to another composite role ? Need clear explaintion. Wipro  3  1825
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ? Wipro  3  1421
E-Mail New Answers        Answer Selected Questions        Post New SAP Security Question
Prev    1    2   [3]    4  ... 5   ... 7   ... 9   ... 11   ... 13   ... 15   ... 17   ... 19   ... 21    Next
    Basis Interview Questions     ABAP Interview Questions     SAPScript Interview Questions
    SD Interview Questions     MM Interview Questions     QM Interview Questions
    PP Interview Questions     PM Interview Questions     PS Interview Questions
    FI CO Interview Questions     HR Interview Questions     SAP CRM Interview Questions
    SRM Interview Questions     APO Interview Questions     Business Warehouse Interview Questions
    Business Workflow Interview Questions     SAP Security Interview Questions     SAP Interfaces Interview Questions
    Netweaver Interview Questions     SAP ALE IDocs Interview Questions     SAP B1 Interview Questions
    SAP AllOther Interview Questions
Un-Answered Questions
 Question Views Asked at   Select
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution.. 243 IBM
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation 403 IBM
Attributes in SE01? 316 IBM
hat is transaction varient? 178 TCS
Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint. 466  
what are the prerequisites we should take before assigning sap_all to a user even we have approval from authorization controllers ? 205  
Hi Experts, can any one let me know the Tables which we use for compliance calibrator & Access enforcer of grc and please let me know the background jobs of grc, Please it's urgent so please answer as soon as possible to these questions , I really appreciate your help, Thanks karunakar 254 IBM
How we Educated client personnel in R/3 Security and general Basis knowledge 154 IBM
how to assign the selected transaction in role example in the role we have a Two transactions(T1,T2)so we have a users U1,U2. i need to assign the T1 and lock the T2 to U1, and U2 assign the bothT1,T2 273 IBM
what all are the numbers of user types in system measurement? 299 iGate
Which transaction should not be given to BASIS and DEV team in Production? 158 IBM
What does PRGN_STAT & TCODE_MOD table consist of? 709  
E-Mail New Answers        Answer Selected Questions

Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
Copyright © 2013  All Rights Reserved.   ::